policy_module(munin, 1.14.0) ######################################## # # Declarations # attribute munin_plugin_domain; attribute munin_plugin_tmp_content; type munin_t; type munin_exec_t alias lrrd_exec_t; init_daemon_domain(munin_t, munin_exec_t) type munin_etc_t; files_config_file(munin_etc_t) type munin_initrc_exec_t; init_script_file(munin_initrc_exec_t) type munin_log_t; logging_log_file(munin_log_t) type munin_runtime_t alias munin_var_run_t; files_pid_file(munin_runtime_t) type munin_tmp_t; files_tmp_file(munin_tmp_t) type munin_var_lib_t; files_type(munin_var_lib_t) type munin_plugin_state_t; files_type(munin_plugin_state_t) munin_plugin_template(disk) munin_plugin_template(mail) munin_plugin_template(selinux) munin_plugin_template(services) type services_munin_plugin_tmpfs_t; files_tmpfs_file(services_munin_plugin_tmpfs_t) munin_plugin_template(system) munin_plugin_template(unconfined) ################################ # # Common munin plugin local policy # allow munin_plugin_domain self:process signal; allow munin_plugin_domain self:fifo_file rw_fifo_file_perms; allow munin_plugin_domain munin_t:tcp_socket rw_socket_perms; read_lnk_files_pattern(munin_plugin_domain, munin_etc_t, munin_etc_t) allow munin_plugin_domain munin_exec_t:file read_file_perms; allow munin_plugin_domain munin_var_lib_t:dir search_dir_perms; manage_files_pattern(munin_plugin_domain, munin_plugin_state_t, munin_plugin_state_t) kernel_read_system_state(munin_plugin_domain) corenet_all_recvfrom_unlabeled(munin_plugin_domain) corenet_all_recvfrom_netlabel(munin_plugin_domain) corenet_tcp_sendrecv_generic_if(munin_plugin_domain) corenet_tcp_sendrecv_generic_node(munin_plugin_domain) corecmd_exec_bin(munin_plugin_domain) corecmd_exec_shell(munin_plugin_domain) files_read_etc_files(munin_plugin_domain) files_read_usr_files(munin_plugin_domain) files_search_var_lib(munin_plugin_domain) fs_getattr_all_fs(munin_plugin_domain) miscfiles_read_localization(munin_plugin_domain) optional_policy(` nscd_use(munin_plugin_domain) ') ######################################## # # Local policy # allow munin_t self:capability { chown dac_override kill setgid setuid sys_rawio }; dontaudit munin_t self:capability sys_tty_config; allow munin_t self:process { getsched setsched signal_perms }; allow munin_t self:unix_stream_socket { accept connectto listen }; allow munin_t self:unix_dgram_socket sendto; allow munin_t self:tcp_socket { accept listen }; allow munin_t self:fifo_file manage_fifo_file_perms; allow munin_t munin_plugin_domain:process signal_perms; allow munin_t munin_etc_t:dir list_dir_perms; allow munin_t munin_etc_t:file read_file_perms; allow munin_t munin_etc_t:lnk_file read_lnk_file_perms; manage_dirs_pattern(munin_t, munin_log_t, munin_log_t) append_files_pattern(munin_t, munin_log_t, munin_log_t) create_files_pattern(munin_t, munin_log_t, munin_log_t) setattr_files_pattern(munin_t, munin_log_t, munin_log_t) logging_log_filetrans(munin_t, munin_log_t, { file dir }) manage_dirs_pattern(munin_t, munin_tmp_t, munin_tmp_t) manage_files_pattern(munin_t, munin_tmp_t, munin_tmp_t) manage_sock_files_pattern(munin_t, munin_tmp_t, munin_tmp_t) files_tmp_filetrans(munin_t, munin_tmp_t, { file dir sock_file }) manage_dirs_pattern(munin_t, munin_var_lib_t, munin_var_lib_t) manage_files_pattern(munin_t, munin_var_lib_t, munin_var_lib_t) manage_lnk_files_pattern(munin_t, munin_var_lib_t, munin_var_lib_t) read_files_pattern(munin_t, munin_plugin_state_t, munin_plugin_state_t) manage_dirs_pattern(munin_t, munin_runtime_t, munin_runtime_t) manage_files_pattern(munin_t, munin_runtime_t, munin_runtime_t) manage_sock_files_pattern(munin_t, munin_runtime_t, munin_runtime_t) files_pid_filetrans(munin_t, munin_runtime_t, { dir file }) can_exec(munin_t, munin_exec_t) kernel_read_system_state(munin_t) kernel_read_network_state(munin_t) kernel_read_all_sysctls(munin_t) corecmd_exec_bin(munin_t) corecmd_exec_shell(munin_t) corenet_all_recvfrom_unlabeled(munin_t) corenet_all_recvfrom_netlabel(munin_t) corenet_tcp_sendrecv_generic_if(munin_t) corenet_tcp_sendrecv_generic_node(munin_t) corenet_tcp_bind_generic_node(munin_t) corenet_sendrecv_munin_server_packets(munin_t) corenet_tcp_bind_munin_port(munin_t) corenet_sendrecv_munin_client_packets(munin_t) corenet_tcp_connect_munin_port(munin_t) corenet_sendrecv_http_client_packets(munin_t) corenet_tcp_connect_http_port(munin_t) dev_read_sysfs(munin_t) dev_read_urand(munin_t) domain_use_interactive_fds(munin_t) domain_read_all_domains_state(munin_t) files_read_etc_runtime_files(munin_t) files_read_usr_files(munin_t) files_list_spool(munin_t) fs_getattr_all_fs(munin_t) fs_search_auto_mountpoints(munin_t) auth_use_nsswitch(munin_t) logging_send_syslog_msg(munin_t) logging_read_all_logs(munin_t) miscfiles_read_fonts(munin_t) miscfiles_read_localization(munin_t) miscfiles_setattr_fonts_cache_dirs(munin_t) sysnet_exec_ifconfig(munin_t) userdom_dontaudit_use_unpriv_user_fds(munin_t) userdom_dontaudit_search_user_home_dirs(munin_t) optional_policy(` apache_content_template(munin) manage_dirs_pattern(munin_t, httpd_munin_content_t, httpd_munin_content_t) manage_files_pattern(munin_t, httpd_munin_content_t, httpd_munin_content_t) apache_search_sys_content(munin_t) ') optional_policy(` cron_system_entry(munin_t, munin_exec_t) ') optional_policy(` fstools_domtrans(munin_t) ') optional_policy(` lpd_domtrans_lpr(munin_t) ') optional_policy(` mta_list_queue(munin_t) mta_read_config(munin_t) mta_read_queue(munin_t) mta_send_mail(munin_t) ') optional_policy(` mysql_read_config(munin_t) mysql_stream_connect(munin_t) ') optional_policy(` netutils_domtrans_ping(munin_t) netutils_kill_ping(munin_t) netutils_signal_ping(munin_t) ') optional_policy(` postfix_list_spool(munin_t) postfix_getattr_all_spool_files(munin_t) ') optional_policy(` rpc_search_nfs_state_data(munin_t) ') optional_policy(` sendmail_read_log(munin_t) ') optional_policy(` seutil_sigchld_newrole(munin_t) ') optional_policy(` udev_read_db(munin_t) ') ################################### # # Disk local policy # allow disk_munin_plugin_t self:capability { sys_admin sys_rawio }; allow disk_munin_plugin_t self:tcp_socket create_stream_socket_perms; rw_files_pattern(disk_munin_plugin_t, munin_var_lib_t, munin_var_lib_t) corenet_sendrecv_hddtemp_client_packets(disk_munin_plugin_t) corenet_tcp_connect_hddtemp_port(disk_munin_plugin_t) dev_getattr_all_blk_files(disk_munin_plugin_t) dev_getattr_lvm_control(disk_munin_plugin_t) dev_read_sysfs(disk_munin_plugin_t) dev_read_urand(disk_munin_plugin_t) files_read_etc_runtime_files(disk_munin_plugin_t) fs_getattr_all_fs(disk_munin_plugin_t) fs_getattr_all_dirs(disk_munin_plugin_t) storage_getattr_fixed_disk_dev(disk_munin_plugin_t) sysnet_read_config(disk_munin_plugin_t) optional_policy(` hddtemp_exec(disk_munin_plugin_t) ') optional_policy(` fstools_exec(disk_munin_plugin_t) ') #################################### # # Mail local policy # allow mail_munin_plugin_t self:capability dac_override; rw_files_pattern(mail_munin_plugin_t, munin_var_lib_t, munin_var_lib_t) dev_read_urand(mail_munin_plugin_t) logging_read_generic_logs(mail_munin_plugin_t) optional_policy(` mta_list_queue(mail_munin_plugin_t) mta_read_config(mail_munin_plugin_t) mta_read_queue(mail_munin_plugin_t) mta_send_mail(mail_munin_plugin_t) ') optional_policy(` nscd_use(mail_munin_plugin_t) ') optional_policy(` postfix_getattr_all_spool_files(mail_munin_plugin_t) postfix_read_config(mail_munin_plugin_t) postfix_list_spool(mail_munin_plugin_t) ') optional_policy(` sendmail_read_log(mail_munin_plugin_t) ') ################################## # # Selinux local policy # selinux_get_enforce_mode(selinux_munin_plugin_t) ################################### # # Service local policy # allow services_munin_plugin_t self:shm create_sem_perms; allow services_munin_plugin_t self:sem create_sem_perms; allow services_munin_plugin_t self:tcp_socket create_stream_socket_perms; allow services_munin_plugin_t self:udp_socket create_socket_perms; allow services_munin_plugin_t self:netlink_route_socket r_netlink_socket_perms; manage_files_pattern(services_munin_plugin_t, services_munin_plugin_tmpfs_t, services_munin_plugin_tmpfs_t) manage_dirs_pattern(services_munin_plugin_t, services_munin_plugin_tmpfs_t, services_munin_plugin_tmpfs_t) fs_tmpfs_filetrans(services_munin_plugin_t, services_munin_plugin_tmpfs_t, { dir file }) corenet_sendrecv_all_client_packets(services_munin_plugin_t) corenet_tcp_connect_all_ports(services_munin_plugin_t) corenet_tcp_connect_http_port(services_munin_plugin_t) dev_read_urand(services_munin_plugin_t) dev_read_rand(services_munin_plugin_t) sysnet_read_config(services_munin_plugin_t) optional_policy(` bind_read_config(services_munin_plugin_t) ') optional_policy(` cups_read_config(services_munin_plugin_t) cups_stream_connect(services_munin_plugin_t) ') optional_policy(` lpd_exec_lpr(services_munin_plugin_t) ') optional_policy(` mysql_read_config(services_munin_plugin_t) mysql_stream_connect(services_munin_plugin_t) ') optional_policy(` netutils_domtrans_ping(services_munin_plugin_t) ') optional_policy(` nscd_use(services_munin_plugin_t) ') optional_policy(` postgresql_stream_connect(services_munin_plugin_t) ') optional_policy(` snmp_read_snmp_var_lib_files(services_munin_plugin_t) ') optional_policy(` sssd_stream_connect(services_munin_plugin_t) ') optional_policy(` varnishd_read_lib_files(services_munin_plugin_t) ') ################################## # # System local policy # allow system_munin_plugin_t self:capability net_admin; allow system_munin_plugin_t self:udp_socket create_socket_perms; rw_files_pattern(system_munin_plugin_t, munin_var_lib_t, munin_var_lib_t) read_files_pattern(system_munin_plugin_t, munin_log_t, munin_log_t) kernel_read_network_state(system_munin_plugin_t) kernel_read_all_sysctls(system_munin_plugin_t) dev_read_sysfs(system_munin_plugin_t) dev_read_urand(system_munin_plugin_t) domain_read_all_domains_state(system_munin_plugin_t) files_read_usr_files(system_munin_plugin_t) init_read_utmp(system_munin_plugin_t) logging_search_logs(system_munin_plugin_t) sysnet_exec_ifconfig(system_munin_plugin_t) term_getattr_unallocated_ttys(system_munin_plugin_t) term_getattr_all_ttys(system_munin_plugin_t) term_getattr_all_ptys(system_munin_plugin_t) optional_policy(` bind_read_config(system_munin_plugin_t) ') ####################################### # # Unconfined plugin local policy # optional_policy(` unconfined_domain(unconfined_munin_plugin_t) ')